SELinux - Date Index
[Prev Page][Next Page]
- Re: [refpolicy] shutdown domain
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- MCS and default labels
- From: Michal Svoboda <michal.svoboda@xxxxxxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restart
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Limitations in modular policy
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restart
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH] Add functionality to upstart to load policy early in boot
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: Problem install Reference Policy
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: libsemanage patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Problem install Reference Policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Problem install Reference Policy
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: Problem install Reference Policy
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Problem install Reference Policy
- From: "zheyeung" <zheyeung@xxxxxxxxx>
- [refpolicy] shutdown domain
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: [policy] post a message to logged in users
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- [policy] post a message to logged in users
- From: Stefan Schulze Frielinghaus <stefan@xxxxxxxxxxxx>
- Re: can't login in enforcing mode for some reason.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: can't login in enforcing mode for some reason.
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Problem install Reference Policy
- From: waqar afridi <afridi.waqar@xxxxxxxxx>
- Re: can't login in enforcing mode for some reason.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: can't login in enforcing mode for some reason.
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: can't login in enforcing mode for some reason.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- can't login in enforcing mode for some reason.
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- RE: SELinux and SSH Timers ?...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SELinux and SSH Timers ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: SELinux and SSH Timers ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: SELinux and SSH Timers ?...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SELinux and SSH Timers ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: SELinux and SSH Timers ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: libsemanage patch
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restart
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: I cannot change my shell context
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: SELinux and SSH Timers ?...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restart
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [RFC PATCH 2/2] cr: debug security_checkpoint_header and security_may_restart
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [RFC PATCH 1/2] cr: lsm: provide hooks for an LSM to track policy changes
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: semodule/libsemanage patch to allow enable and disable of modules.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: SELinux and SSH Timers ?...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- SELinux and SSH Timers ?...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I cannot change my shell context
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: SELinux Packages and Library interactions...
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux Packages and Library interactions...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- RE: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: I cannot change my shell context
- From: Dennis Wronka <linuxweb@xxxxxxx>
- RE: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] libselinux: disable refcounting in the userspace AVC
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- [PATCH] libselinux: disable refcounting in the userspace AVC
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- I cannot change my shell context
- From: "zheyeung" <zheyeung@xxxxxxxxx>
- Re: [libsepol] Unchecked input leades to integer underflow
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- CentOS / RHEL5: where is setrans.conf?
- From: Joshua Kramer <josh@xxxxxxxxxxxxxxxx>
- Re: CentOS / RHEL5: where is setrans.conf?
- From: josh@xxxxxxxxxxxxxxxx
- Re: restorecon and symbolic links
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: policycoreutils - semanage does not set umask
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/2] New LSM hooks for the TUN driver
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: [libsepol] Unchecked input leades to integer underflow
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [libsepol] Unchecked input leades to integer underflow
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [libsepol] Unchecked input leades to integer underflow
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- Re: [refpolicy] [PATCH 0/2] Policy support for the new TUN hooks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: Stephen Smalley <sds@xxxxxxxxxxxxxx>
- Re: [libsepol] Unchecked input leades to integer underflow
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: I've got a problem in my installing selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- Re: vsftpd not changing security context while dropping privileges
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] lsm: Add hooks to the TUN driver
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [libsepol] Unchecked input leades to integer underflow
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: I've got a problem in my installing selinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- I've got a problem in my installing selinux
- From: "zheyeung" <zheyeung@xxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: restorecon and symbolic links
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: "Serge E. Hallyn" <serge@xxxxxxxxxx>
- restorecon and symbolic links
- From: Martin Orr <martin@xxxxxxxxxxxxxx>
- text books and computer security
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 3/5] cr: add generic LSM c/r support
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 2/2] selinux: Support for the new TUN LSM hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 0/2] New LSM hooks for the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 2/2] refpol: Policy for the new TUN driver access controls
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 0/2] Policy support for the new TUN hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/2] refpol: Add the "tun_socket" object class flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 4/5] cr: add smack support to lsm c/r
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 5/5] cr: add selinux support
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 1/1] mktree: accept the lsm_name field in header and add -k flag
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 3/5] cr: add generic LSM c/r support
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 2/5] cr: checkpoint the active LSM and add RESTART_KEEP_LSM flag
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- semodule/libsemanage patch to allow enable and disable of modules.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] Fix semanage_direct_commit() to notice disable_dontaudit
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Adding AV assertion to selinux policy in RHEL5
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: bugzilla 518569 discusses making vsftpd SELinux aware.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bugzilla 518569 discusses making vsftpd SELinux aware.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: bugzilla 518569 discusses making vsftpd SELinux aware.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- bugzilla 518569 discusses making vsftpd SELinux aware.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Adding AV assertion to selinux policy in RHEL5
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Adding AV assertion to selinux policy in RHEL5
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Debian policy package
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [refpolicy] [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Adding AV assertion to selinux policy in RHEL5
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC PATCH v1 0/2] Policy support for the new TUN hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 1/2] refpol: Add the "tun_socket" object class flask definitions
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 2/2] refpol: Policy for the new TUN driver access controls
- From: Paul Moore <paul.moore@xxxxxx>
- Re: This is a patch to both libsemanage and policycoreutils to change the behaviour of --upgrade
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Semodule syntax is broken.
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: libsemanage issue with bzip-blocksize=0 and compressed modules in store
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: libsemanage issue with bzip-blocksize=0 and compressed modules in store
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: object context records for Xen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- This is a patch to both libsemanage and policycoreutils to change the behaviour of --upgrade
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: object context records for Xen
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: object context records for Xen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: object context records for Xen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: object context records for Xen
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage issue with bzip-blocksize=0 and compressed modules in store
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: object context records for Xen
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: libsemanage issue with bzip-blocksize=0 and compressed modules in store
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- libsemanage issue with bzip-blocksize=0 and compressed modules in store
- From: Chris PeBenito <pebenito@xxxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: Semodule syntax is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- role access
- From: mina elnino <potushka@xxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Russell Coker <russell@xxxxxxxxxxxx>
- Re: policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- policycoreutils: audit2allow gives bad policy for role violations
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- policycoreutils - semanage does not set umask
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- policycoreutils: audit2allow -l doesn't work with dmesg pipe
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- policycoreutils: The error message on forkpty() failure is not clear or useful.
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- SELinux: Invalid object class mapping, disabling SELinux support. (XACE)
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: Semodule syntax is broken.
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [refpolicy] SELinux policy for the new TUN hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: Semodule syntax is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- xattr support for filesystem not in policy
- From: Dan Teitsort <dteitsort@xxxxxxxxxxxxxx>
- Re: Semodule syntax is broken.
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Semodule syntax is broken.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- object context records for Xen
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] SELinux policy for the new TUN hooks
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- SELinux policy for the new TUN hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Not quite MLS.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 1/2] policycoreutils: share setfiles restore function with restorecond
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 2/2] policAycoreutils: share setfiles restore function with restorecond
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checking user status
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch to semanage
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/SELinux: remove duplicated #include
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checking user status
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checking user status
- From: Larry <selinux@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: checking user status
- From: Larry <selinux@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: checking user status
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: Not quite MLS.
- From: Paul McNabb <mcnabb@xxxxxxxxxxxxxxxxx>
- Re: checking user status
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: checking user status
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Not quite MLS.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Not quite MLS.
- From: rob myers <rob.myers@xxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/SELinux: remove duplicated #include
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] Security/sysfs: v2 - Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: Not quite MLS.
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Not quite MLS.
- From: rob myers <rob.myers@xxxxxxxxxxxxxxx>
- Re: checking user status
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: Why use write_lock_irq() in services.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Why use write_lock_irq() in services.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Why use write_lock_irq() in services.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Why use write_lock_irq() in services.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- setools: Missing function prototypes
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: checking user status
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: checking user status
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: checking user status
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: checking user status
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Not quite MLS.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: Convert avc_audit to use lsm_audit.h
- From: James Morris <jmorris@xxxxxxxxx>
- checking user status
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: Push mmap_min_addr changes to Linus
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Push mmap_min_addr changes to Linus
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Not quite MLS.
- From: rob myers <rob.myers@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2 -v3] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 -v3] Namespacing of security/selinux
- From: Glenn Faden <Glenn.Faden@xxxxxxx>
- Re: policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: SElinux protection
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [PATCH 1/2 -v3] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 -v3] Namespacing of security/selinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/2 -v3] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- policycoreutils, sepolgen (sepolgen-ifgen) issues on Debian
- From: Manoj Srivastava <srivasta@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH -v3] SELinux: Convert avc_audit to use lsm_audit.h
- From: Steve Grubb <sgrubb@xxxxxxxxxx>
- Re: [PATCH -v3] SELinux: Convert avc_audit to use lsm_audit.h
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Push mmap_min_addr changes to Linus
- From: Eric Paris <eparis@xxxxxxxxxx>
- RE: SElinux protection
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: SElinux protection
- From: Stefano Carucci <stecarucci@xxxxxxxxxxx>
- Re: SElinux protection
- From: James Morris <jmorris@xxxxxxxxx>
- SElinux protection
- From: Stefano Carucci <stecarucci@xxxxxxxxxxx>
- [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] Networking: use CAP_NET_ADMIN when deciding to call request_module
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/3] Networking: use CAP_NET_ADMIN when deciding to call request_module
- From: James Morris <jmorris@xxxxxxxxx>
- Re: error: too many arguments to function 'security_getenforce'
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 1/3] Networking: use CAP_NET_ADMIN when deciding to call request_module
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 3/3] SELinux: add selinux_kernel_module_request
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: error: too many arguments to function 'security_getenforce'
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: error: too many arguments to function 'security_getenforce'
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: error: too many arguments to function 'security_getenforce'
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: error: too many arguments to function 'security_getenforce'
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 2/3] security: introducing security_request_module
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH 1/3] Networking: use CAP_NET_ADMIN when deciding to call request_module
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- [PATCH 1/3] Networking: use CAP_NET_ADMIN when deciding to call request_module
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] security: introducing security_request_module
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 3/3] SELinux: add selinux_kernel_module_request
- From: Eric Paris <eparis@xxxxxxxxxx>
- Cron job fails to transition
- From: Dan <carbonneau@xxxxxxxxx>
- Re: error: too many arguments to function 'security_getenforce'
- From: Shintaro Fujiwara <shintaro.fujiwara@xxxxxxxxx>
- error: too many arguments to function 'security_getenforce'
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: [RFC PATCH v2 2/2] selinux: Support for the new TUN LSM hooks
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] selinux: Support for the new TUN LSM hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v2 2/2] selinux: Support for the new TUN LSM hooks
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v2 1/2] lsm: Add hooks to the TUN driver
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- This patch fixes the exception handling in libselinux-python bindings
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] selinux: Support for the new TUN LSM hooks
- From: Paul Moore <paul.moore@xxxxxx>
- Re: libsemanage patch
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [RFC PATCH v2 2/2] selinux: Support for the new TUN LSM hooks
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2 1/2] lsm: Add hooks to the TUN driver
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Proposed patch to add seinfo and sesearch bindings to setools.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch setfiles to only warn if add_remove fails to lstat on user initiated excludes.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Patch setfiles to only warn if add_remove fails to lstat on user initiated excludes.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [refpolicy] refpolicy doesnt see ext4 but fix_files does
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Patch setfiles to only warn if add_remove fails to lstat on user initiated excludes.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- refpolicy doesnt see ext4 but fix_files does
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- Re: Patch setfiles to only warn if add_remove fails to lstat on user initiated excludes.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Patch setfiles to only warn if add_remove fails to lstat on user initiated excludes.
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: compiling SELinux in xserver seems to not find /lib64
- From: Eamon Walsh <ewalsh@xxxxxxxxxxxxx>
- compiling SELinux in xserver seems to not find /lib64
- From: Justin Mattock <justinmattock@xxxxxxxxx>
- [RFC PATCH v2 0/2] New LSM hooks for the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 2/2] selinux: Support for the new TUN LSM hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v2 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- Patch setfiles to only warn if add_remove fails to lstat on user initiated excludes.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] SELinux: re. BUG memory leakage at ./security/selinux/hooks.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] SELinux: re. BUG memory leakage at ./security/selinux/hooks.c
- From: James Morris <jmorris@xxxxxxxxx>
- Re: BUG memory leakage at ./security/selinux/hooks.c
- From: James Morris <jmorris@xxxxxxxxx>
- RE: A question about selinux userspace tools
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- RE: A question about selinux userspace tools
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: A question about selinux userspace tools
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- FW: Is a monolithic monothlitic policy more secure than modular
- From: "West, Gary-P55389" <Gary.West@xxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- RE: A question about selinux userspace tools
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Questions about TE rules in refpolicy-20081210
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- RE: Questions about TE rules in refpolicy-20081210
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- RE: A question about selinux userspace tools
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [PATCH -v4 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [patch] libsemanage: do not hard link files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [patch] libsemanage: do not hard link files
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [patch] libsemanage: do not hard link files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [patch] libsemanage: do not hard link files
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: Eric Paris <netdev@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: module that checks each access
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- module that checks each access
- From: mina elnino <potushka@xxxxxxxxx>
- Re: [RFC PATCH v1 2/2] selinux: Support for the new TUN LSM hooks
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- RE: Questions about TE rules in refpolicy-20081210
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: A question about selinux userspace tools
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: Questions about TE rules in refpolicy-20081210
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Questions about TE rules in refpolicy-20081210
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- RE: A question about installing refpolicy-2.10081210
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- RE: A question about selinux userspace tools
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: [RFC PATCH v1 0/2] The Long Lost TUN LSM Hooks
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v4 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: James Morris <jmorris@xxxxxxxxx>
- [RFC PATCH v1 0/2] The Long Lost TUN LSM Hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 2/2] selinux: Support for the new TUN LSM hooks
- From: Paul Moore <paul.moore@xxxxxx>
- [RFC PATCH v1 1/2] lsm: Add hooks to the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH v3] libsemanage: Enable configuration of bzip behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Enable configuration of bzip behavior
- From: Mike Edenfield <kutulu@xxxxxxxxxx>
- Re: [PATCH v3] libsemanage: Enable configuration of bzip behavior
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Just a quick thought.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: [PATCH v2] libsemanage: Enable configuration of bzip behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH v3] libsemanage: Enable configuration of bzip behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v2] libsemanage: Enable configuration of bzip behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [PATCH v2] libsemanage: Enable configuration of bzip behavior
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- [PATCH v2] libsemanage: Enable configuration of bzip behavior
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A question about selinux userspace tools
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Just a quick thought.
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Re: A question about selinux userspace tools
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: A question about installing refpolicy-2.10081210
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Just a quick thought.
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: A question about selinux userspace tools
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Just a quick thought.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: A question about selinux userspace tools
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- A question about selinux userspace tools
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- A question about installing refpolicy-2.10081210
- From: TaurusHarry <harrytaurus2002@xxxxxxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: Dennis Wronka <linuxweb@xxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: best way to comile userspace to use lib64 for x86_64
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- best way to comile userspace to use lib64 for x86_64
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: compiling errors!
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- [PATCH] setfiles: only call realpath() on user-supplied pathnames
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: compiling errors!
- From: mina elnino <potushka@xxxxxxxxx>
- Re: compiling errors!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: MLS F11: why not use execute_no_trans? user_t transitions to itself!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Cliffe <cliffe@xxxxxx>
- backward/forward binary compatibility checker
- From: Andrey Ponomarenko <susanin@xxxxxxxxx>
- [PATCH -v4 3/3] Security/SELinux: seperate lsm specific mmap_min_addr
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v4 2/3] SELinux: call cap_file_mmap in selinux_file_mmap
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v4 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [ANN] SELinux Userspace release
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: Fixfiles has a bug when looking at btrfs file systems.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: MLS F11: why not use execute_no_trans? user_t transitions to itself!
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- MLS F11: why not use execute_no_trans? user_t transitions to itself!
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Cliffe <cliffe@xxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] setfiles: only call realpath if the path is relative
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- ANN: Reference Policy Release
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: [RFC][PATCH] setfiles: only call realpath if the path is relative
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC][PATCH] setfiles: only call realpath if the path is relative
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [RFC][PATCH] setfiles: only call realpath if the path is relative
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Cliffe <cliffe@xxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Cliffe <cliffe@xxxxxx>
- Re: compiling errors!
- From: mina elnino <potushka@xxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Help with SELinux policy for Usability Study
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: compiling errors!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Help with SELinux policy for Usability Study
- From: Cliffe <cliffe@xxxxxx>
- {Spam?} C Code Compilation Errors
- From: "Remmolt G. Zwartsenberg" <remmolt@xxxxxxxxxxxxxxx>
- Re: [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: "Serge E. Hallyn" <serue@xxxxxxxxxx>
- Re: compiling errors!
- From: mina elnino <potushka@xxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH -v3 1/3] Capabilities: move cap_file_mmap to commoncap.c
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v3 2/3] SELinux: call cap_file_mmap in selinux_file_mmap
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v3 3/3] Security/SELinux: seperate lsm specific mmap_min_addr
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: is it safe to use ext4 for SELinux
- From: Doug Sikora <dsikora@xxxxxxxxxx>
- is it safe to use ext4 for SELinux
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: compiling errors!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- compiling errors!
- From: mina elnino <potushka@xxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Larry <selinux@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- RE: what is an object manager?!
- From: "Karl MacMillan" <kmacmillan@xxxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: how to compile checkpolicy package
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2] policycoreutils: get setfiles to skip mounts without seclabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Larry <selinux@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Dominick Grift <domg472@xxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- Re: "Error! Unable to set executable context."
- From: Dominick Grift <domg472@xxxxxxxxx>
- "Error! Unable to set executable context."
- From: Larry Ross <selinux.larry@xxxxxxxxx>
- how to compile checkpolicy package
- From: mina elnino <potushka@xxxxxxxxx>
- Re: [PATCH -v2] policycoreutils: get setfiles to skip mounts without seclabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: what is an object manager?!
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: what is an object manager?!
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: what is an object manager?!
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: what is an object manager?!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: what is an object manager?!
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Cross Domain equivalences
- From: Shaz <shazalive@xxxxxxxxx>
- Re: what is an object manager?!
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: James Morris <jmorris@xxxxxxxxx>
- what is an object manager?!
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- [ANN] SELinux Developer Summit 2009 - Schedule Published
- From: James Morris <jmorris@xxxxxxxxx>
- Re: Policy database
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Policy database
- From: Stefano Carucci <stecarucci@xxxxxxxxxxx>
- Re: Policy database
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH -v2 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: James Morris <jmorris@xxxxxxxxx>
- Policy database
- From: Stefano Carucci <stecarucci@xxxxxxxxxxx>
- Re: mmap_min_addr and your local LSM (ok, just SELinux)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v2 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: James Morris <jmorris@xxxxxxxxx>
- [PATCH -v2 2/2] Security/SELinux: seperate lsm specific mmap_min_addr
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH -v2 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: mmap_min_addr and your local LSM (ok, just SELinux)
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: adding human understandable, and translatable description support to selinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: mmap_min_addr and your local LSM (ok, just SELinux)
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH 1/2] VM/SELinux: require CAP_SYS_RAWIO for all mmap_zero operations
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/2] SELinux: selinux_file_mmap always enforce mapping the 0 page
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: mmap_min_addr and your local LSM (ok, just SELinux)
- From: James Morris <jmorris@xxxxxxxxx>
- Re: mmap_min_addr and your local LSM (ok, just SELinux)
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- mmap_min_addr and your local LSM (ok, just SELinux)
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: adding human understandable, and translatable description support to selinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: adding human understandable, and translatable description support to selinux
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: adding human understandable, and translatable description support to selinux
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: adding human understandable, and translatable description support to selinux
- From: "Remmolt G. Zwartsenberg" <remmolt@xxxxxxxxxxxxxxx>
- adding human understandable, and translatable description support to selinux
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Trying to cause a denial with rsync and SELinux
- From: Scott Radvan <sradvan@xxxxxxxxxx>
- Re: [RFC] Common Intermediary Language
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC] Common Intermediary Language
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- [PATCH -v2] policycoreutils: get setfiles to skip mounts without seclabel
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- RE: /etc/selinux/ directory structure...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: [RFC] Common Intermediary Language
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: Patch to semanage
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [refpolicy] refpolicy moved to git
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- RE: /etc/selinux/ directory structure...
- From: Dominick Grift <domg472@xxxxxxxxx>
- RE: /etc/selinux/ directory structure...
- From: Dominick Grift <domg472@xxxxxxxxx>
- RE: /etc/selinux/ directory structure...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- Re: /etc/selinux/ directory structure...
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: /etc/selinux/ directory structure...
- From: Dominick Grift <domg472@xxxxxxxxx>
- /etc/selinux/ directory structure...
- From: "Hasan Rezaul-CHR010" <CHR010@xxxxxxxxxxxx>
- libsemanage patch
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- [PATCH] Security/sysfs: Enable security xattrs to be set on sysfs files, directories, and symlinks.
- From: "David P. Quigley" <dpquigl@xxxxxxxxxxxxx>
- Re: [RFC] Common Intermediary Language
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [PATCH] policycoreutils: get setfiles to skip mounts without seclabel
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC] Common Intermediary Language
- From: Caleb Case <ccase@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: get setfiles to skip mounts without seclabel
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH -v3] SELinux: Convert avc_audit to use lsm_audit.h
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH] policycoreutils: get setfiles to skip mounts without seclabel
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [RFC] Install SELinux policies from rpm package header
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- [PATCH] policycoreutils: get setfiles to skip mounts without seclabel
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: request for comments: is this (MLS/SELinux) picture right?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Chad Sellers <csellers@xxxxxxxxxx>
- refpolicy moved to git
- From: "Christopher J. PeBenito" <cpebenito@xxxxxxxxxx>
- RE: [RFC] Install SELinux policies from rpm package header
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Joe Nall <joe@xxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Chad Sellers <csellers@xxxxxxxxxx>
- RE: [RFC] Install SELinux policies from rpm package header
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- RE: [RFC] Install SELinux policies from rpm package header
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- request for comments: is this (MLS/SELinux) picture right?
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- Re: [PATCH -v2] SELinux: Convert avc_audit to use lsm_audit.h
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH -v2] SELinux: Convert avc_audit to use lsm_audit.h
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH -v2] SELinux: Convert avc_audit to use lsm_audit.h
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: max bianco <maximilianbianco@xxxxxxxxx>
- RE: [RFC] Install SELinux policies from rpm package header
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [PATCH -v2] SELinux: Convert avc_audit to use lsm_audit.h
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: James Carter <jwcart2@xxxxxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH -v2] SELinux: Convert avc_audit to use lsm_audit.h
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: Fixfiles has a bug when looking at btrfs file systems.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [PATCH 3/3] Wrap SMACK and SELINUX audit data structs in ifdefs
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 2/3] Make lsm_priv union in lsm_audit.h anonymous
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/3] Move variable function in lsm_audit.h into SMACK private space
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [PATCH] Convert avc_audit to use lsm_audit.h
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH] Convert avc_audit to use lsm_audit.h
- From: Eric Paris <eparis@xxxxxxxxxx>
- Patch to semanage
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [RFC] Install SELinux policies from rpm package header
- From: Paul Howarth <paul@xxxxxxxxxxxx>
- Fixfiles has a bug when looking at btrfs file systems.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [RFC] Install SELinux policies from rpm package header
- From: Chad Sellers <csellers@xxxxxxxxxx>
- Re: [PATCH 1/3] Move variable function in lsm_audit.h into SMACK private space
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH 1/3] Move variable function in lsm_audit.h into SMACK private space
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 3/3] Wrap SMACK and SELINUX audit data structs in ifdefs
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: [PATCH 1/3] Move variable function in lsm_audit.h into SMACK private space
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [PATCH 3/3] Wrap SMACK and SELINUX audit data structs in ifdefs
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH 2/3] Make lsm_priv union in lsm_audit.h anonymous
- From: Eric Paris <eparis@xxxxxxxxxx>
- [PATCH 2/3] Make lsm_priv union in lsm_audit.h anonymous
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 1/3] Move variable function in lsm_audit.h into SMACK private space
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [PATCH 1/3] Move variable function in lsm_audit.h into SMACK private space
- From: Eric Paris <eparis@xxxxxxxxxx>
- removing context
- From: Brian Krusic <brian@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [PATCH 2/2 -v3] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 1/2 -v3] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Possible OpenSSH exploit
- From: Tracy Reed <treed@xxxxxxxxxxxxxxx>
- Re: libsemanage direct_api can return errors < 0.
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [Patch 2/2 v7] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- RE: [Patch 2/2 v7] libsemanage: maintain disable dontaudit state between handle commits
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [Patch 2/2 v7] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [PATCH] selinux: Cleanup the socket handling functions
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [Patch 2/2 v7] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v7] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/4 -v2] Namespacing of security/selinux
- From: Eric Paris <eparis@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- [Patch 2/2 v7] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2 v6] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Matchpathcon patch to print <<none>> when it gets enoent.
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: Policy loading problem
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: This patch add seusers support to SELinux
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- RE: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: "Joshua Brindle" <jbrindle@xxxxxxxxxx>
- Re: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [PATCH v5] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v4] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2 v3] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v3] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [PATCH 1/4 -v2] Namespacing of security/selinux
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/4 -v2] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v3] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Eric Paris <eparis@xxxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/4 -v2] Namespacing of security/selinux
- From: Paul Moore <paul.moore@xxxxxx>
- Re: [PATCH 1/4 -v2] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v3] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v3] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- [PATCH 2/4 -v2] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 4/4 -v2] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 3/4 -v2] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 1/4 -v2] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [Patch 2/2 v2] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2 v2] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch 3/2 v2] semodule: maintain old functionality
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 3/2] semodule: maintain old functionality
- From: Joshua Brindle <method@xxxxxxxxxxxxxxx>
- [Patch 3/2] semodule: maintain old functionality
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- [Patch 2/2 v2] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: maintain disable dontaudit state between handle commits
- From: Daniel J Walsh <dwalsh@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: maintain disable dontaudit state between handle commits
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH v5] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- [Patch 2/2] libsemanage: maintain disable dontaudit state between handle commits
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- [Patch 1/2] libsepol: method to check disable dontaudit flag.
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- [PATCH v5] setfiles converted to fts
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: create a don't audit flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: create a don't audit flag
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Namespacing of security/selinux
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: create a don't audit flag
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [Patch 2/2] libsemanage: create a don't audit flag
- From: Christopher Pardy <cpardy@xxxxxxxxxx>
- Re: [PATCH v4] setfiles converted to fts
- From: Stephen Smalley <sds@xxxxxxxxxxxxx>
- Re: Building for Ubuntu 9.04 - too few arguments to heap_create_with_catalog error
- From: KaiGai Kohei <kaigai@xxxxxxxxxxxx>
- Re: Building for Ubuntu 9.04 - too few arguments to heap_create_with_catalog error
- From: Shaz <shazalive@xxxxxxxxx>
- Re: [PATCH] SElinux: Fix some typos.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] SElinux: Fix some typos.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH] SElinux: Fix some typos.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
- Re: [PATCH] SElinux: Fix some typos.
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 3/4] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 3/4] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [RFC PATCH v2] selinux: Fix a problem with socket labels and the TUN driver
- From: Paul Moore <paul.moore@xxxxxx>
- [PATCH 1/4] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 2/4] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 3/4] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- [PATCH 4/4] Namespacing of security/selinux
- From: Thomas Liu <tliu@xxxxxxxxxx>
- Re: request for review of, and collaboration on SELinux models wiki entry
- From: Sebastian Pfaff <sebastian.pfaff@xxxxxxxxx>
- [PATCH v4] setfiles converted to fts
- From: Thomas Liu <tliu@xxxxxxxxxx>
- SELinux-Fix-some-typos.
- From: "Justin P. Mattock" <justinmattock@xxxxxxxxx>
[Index of Archives]
[Selinux Refpolicy]
[Fedora Users]
[Linux Kernel Development]